As promised last issue, I’m re-printing a glossary of strong/second factor authentication methods that TriCipher provided me along with the results of its sponsored survey on people’s perceptions of ...
The Kerberos authentication method originated at the Massachusetts Institute of Technology in the 1980s, as part of a project called Athena. The project involved integrating the computers on the MIT ...
Corporate networks have not only grown in size over the years, but they have also grown in complexity. Over the years, new services have been implemented to satisfy the growing demand for easy to use ...
In today’s digital age, personal data is never safe. Cybercriminals are looking for every opportunity possible to acquire your user data. Ongoing data breaches continue to expose usernames, passwords, ...
As much as our digital ecosystem has advanced in recent years, some elements of the security world have been slower to change. For example, a shortage of well-trained cybersecurity professionals has ...
It’s RSA week in San Francisco, so that means lots of announcements, even if they’re only of the “I’m waving so you know I’m still here” variety. I fondly remember one such announcement from a few ...
Telco firm DITO Telecommunity on Thursday announced the commercial deployment of Silent Network Authentication (SNA) in the Philippines through its partnership with Shush and Twilio. This will mark ...
Blockchain firm Lightning Labs drafted the specifications of a new Lightning Network-based authentication system that could replace traditional email-based accounts. According to a March 30 ...
New York, NY – July 13, 2022 – HYPR, The Passwordless Company™ and Vanson Bourne, today released a new report that reveals the financial sector is failing to combat the biggest threat in cybersecurity ...